Apple fixes vulnerability in Siri and Touch ID

Siri ios 9

A vulnerability was recently discovered in iOS that allowed unauthorized access to phone contacts and photos through Siri and 3D Touch programming. Well, this hole has been plugged and solved. However, with the solution in place, Siri now needs confirmation via security code or fingerprint to access Twitter searches.

In a statement made to The Washington Post, an Apple spokesman confirmed that the deployment of the solution to the problem was successfully deployed and that it did not require publishing a new version of the operating system, but rather it has been launched on top of the existing code to correct it. As a result of this brief statement by Apple, we can deduce that the problem, therefore, was located in the internal code used by Siri or Touch ID, that is, in Apple's servers ... and not in the operating system itself. Yes.

Since then, as we mentioned, it has been found that, indeed, Siri now requires the phone's security code or authenticates the user's identity using a fingerprint when searching Twitter from Siri. This security extension could also be being applied to other applications that use Twitter and that from now on also require this additional interaction when using Twitter, however, it has not yet been verified due to the immediacy of the action deployed by Manzana.

It is expected that this measure is a provisional decision and that Apple, in a future update of the operating system, will solve the problem in a definitive way so that the vulnerability does not exist and so that Siri does not need additional approval when searching on Twitter. . In this way, users will regain the usual usability of the social network from the voice assistant.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.